CN110222077A - Method of proof and system based on block chain - Google Patents
Method of proof and system based on block chain Download PDFInfo
- Publication number
- CN110222077A CN110222077A CN201910468557.0A CN201910468557A CN110222077A CN 110222077 A CN110222077 A CN 110222077A CN 201910468557 A CN201910468557 A CN 201910468557A CN 110222077 A CN110222077 A CN 110222077A
- Authority
- CN
- China
- Prior art keywords
- client
- document
- endorsement
- inquiry
- template
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses methods of proof and system based on block chain, comprising the following steps: the identity of real-name authentication client, wherein client includes enterprises end and user terminal;Template is respectively configured in different documentary evidences needed for client, corresponding template is obtained according to the client authenticated, and load the configured document of the template;The template is formulated into data rule using granted network, unique identifier corresponding in the document is pushed in alliance's chain by marriage chain code means;The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.The invention has the advantages that: that can not only save workplace in real time to prove and evidence, and workplace data is avoided to play tricks, while screening cost reduces and efficiently.
Description
Technical field
The present invention relates to block chain technical fields, it particularly relates to a kind of method of proof and system based on block chain.
Background technique
Block chain technology is that calculation of knowing together with storing data, using distributed node is verified using block linked data structure
Method guarantees the safety of data transmission and access to generate, using by automatized script with more new data, in the way of cryptography
One kind of generation and operation data completely new distributed basis framework and calculation, block chain has decentralization, open, from
The property controlled, the characteristic that information can not distort.
In workplace, the possibility that labour dispute occurs exists always, once meeting with, workplace is unexpected, and labourer needs to tie up in accordance with the law
Legal labour equity is protected, and it is required for providing corresponding evidence then.Therefore, labourer will improve troxerutine tabtets in accordance with the law, usually
Oneself pays attention to everywhere, saves some workplaces proofs and evidence in time, makes provision against emergencies!Meanwhile some workplaces prove not only relationship labor
Dynamic equity also influences house indirectly, goes abroad, the life item such as children's schooling, also must pay attention to preservation, in addition for enterprise its
Problems faced has: increasing emptily emolument, exaggerates work achievement, false cognition background and Reason for leaving and education experience is played tricks etc. and to be asked
Topic, screening cost are high and inefficient;For job hunter, passing workplace credit record can not create value.
For the problems in the relevant technologies, currently no effective solution has been proposed.
Summary of the invention
For above-mentioned technical problem in the related technology, the present invention proposes a kind of method of proof based on block chain, not only
Workplace can be saved in real time to be proved and evidence, and workplace data is avoided to play tricks, while screening cost reduces and efficiently.
To realize the above-mentioned technical purpose, the technical scheme of the present invention is realized as follows:
A kind of method of proof based on block chain, comprising the following steps:
The identity of real-name authentication client, wherein client includes enterprises end and user terminal;
Template is respectively configured in different documentary evidences needed for client, corresponding template is obtained according to the client authenticated, and
Load the configured document of the template;
The template is formulated into data rule using granted network, marriage chain code means are by unique mark corresponding in the document
Know symbol to be pushed in alliance's chain;
The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.
Further, the chain code means include:
Client logs in CA and obtains signing certificate, sends transaction request to endorsement node;
Node of endorsing carries out authority verification, and simulates Chaincode transaction, and return endorsement result of signing;Client receives foot
Enough endorsement nodes check endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint by client;
By ordering joint to read-write collection sequence, and according to block arrangement block out, confirmation node is sent by block;
Confirmation node exports after verifying to block, transaction read-write collection and endorsement strategy.
Further, the identity of the real-name authentication client includes:
The document authentication information for inputting client, is uploaded to background server for the authentication information;
The authentication information is audited, the authentication information after audit is subjected to authentication verification by third-party server.
Further, the documentary evidence issued in advance is both needed to displaying after client carries out inquiry authorization before inquiry includes:
Enterprises end receives the document, scans two dimensional code on the document and carries out revene lookup, and sends inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
Further, the documentary evidence issued in advance is both needed to show the list after client carries out inquiry authorization before inquiry
According to the raw information for opening cochain, wherein raw information includes document block chain anti-fake code, two dimensional code, electronic-seal and content
Information.
Another aspect of the present invention provides a kind of proof system based on block chain, comprising:
Authentication module, the identity for real-name authentication client, wherein client includes enterprises end and user terminal;
Configuration module is obtained for template to be respectively configured in different documentary evidences needed for client according to the client authenticated
Corresponding template is taken, and loads the configured document of the template;
Pushing module, for the template to be formulated data rule using granted network, marriage chain code means are by the document
In corresponding unique identifier be pushed in alliance's chain;
Authorization module is inquired, for the documentary evidence issued in advance to be both needed to show after client carries out inquiry authorization before inquiry.
Further, the chain code means include:
First sending module logs in CA for client and obtains signing certificate, sends transaction request to endorsement node;
First inspection module, for endorsing, node carries out authority verification, and simulates Chaincode transaction, and return endorsement of signing
As a result;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint for client by the second sending module;
Third sending module for ordering joint to sort to read-write collection, and according to block arrangement block out, block is sent
To confirmation node;
Second correction verification module exports after node verifies block, transaction read-write collection and endorsement strategy for confirming.
Further, authentication module includes:
The authentication information is uploaded to background server for inputting the document authentication information of client by input module;
The authentication information after audit is passed through third-party server for auditing the authentication information by authentication verification module
Carry out authentication verification.
Further, the inquiry authorization module includes:
Scan module receives the document for enterprises end, scans two dimensional code on the document and carries out revene lookup, and sends
Inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
Further, the documentary evidence issued in advance is both needed to show the list after client carries out inquiry authorization before inquiry
According to the raw information for opening cochain, wherein raw information includes document block chain anti-fake code, two dimensional code, electronic-seal and content
Information.
Beneficial effects of the present invention: can not only save workplace proof and evidence in real time, and workplace data is avoided to play tricks,
Simultaneously screening cost reduce and efficiently.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the flow chart of the method for proof based on block chain described according to embodiments of the present invention;
Fig. 2 is the flow chart that document according to embodiments of the present invention generates;
Fig. 3 is the flow chart that document according to embodiments of the present invention is issued;
Fig. 4 is the flow chart of area for document authentication according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the proof system based on block chain described according to embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art's every other embodiment obtained belong to what the present invention protected
Range.
As shown in Figs 1-4, a kind of method of proof based on block chain according to embodiments of the present invention, including following step
It is rapid:
The identity of real-name authentication client, wherein client includes enterprises end and user terminal;
Specifically, carrying out real-name authentication, i.e. enterprise's real-name authentication and user's real-name authentication, certification to enterprises end and registration user terminal
Mode is divided into data automated validation and two kinds of mutual authentication, and authentication field includes but is not limited to Business Name, legal representative, society
It can credit code, firm telephone, CompanyAddress and business license information.
Document generation is carried out before real-name authentication, is logged in by enterprises end, is generated interface into document, is selected template content
It fills in, generates document, whether confirmation document generates, if confirmation, document is generated, if not confirming, return continues to generate document,
Iterative cycles send mailbox for document generation until document generates.
Template is respectively configured in different documentary evidences needed for client, respective mode is obtained according to the client authenticated
Plate, and load the configured document of the template;
That is: to meet the custom content configuration feature that different workplace documentary evidences are carried out, file is needed to configure according to scene
Field and data type, and the field and data type of file are verified.Such as configuration leaving office proves template, needs at this time
It defines ID card No., name, telephone number, registration date, position, date and the Reason for leaving of leaving office and constrains each element
Field fills in rule.
Fill substance after selection template, the element field that the content showed at this time as custom-configures in a template are filled out
Restrictive verification can be done during writing to each field, such as the leaving office of selection proves template, need to complete to ID card No.,
Name, telephone number, the typing on registration date, position, leave office date, Reason for leaving etc., Data Elements verification, which finishes, to be generated
While movement can the document cover by the corresponding Electronic Signature of organization of our unit's authentication registration and this held document
Unique two dimensional code mark show.
By the template using granted network formulate data rule, marriage chain code means by the document it is corresponding only
One identifier is pushed in alliance's chain, wherein chain code means are modular code architecture+distributed logic processing, " to need
It is to be understood that " it is that principle carrys out public data to the abundant inquiry of immutable distributed account book and there is digital cipher and sensitive data to protect
Shield, it is bcrypt that identification information, which selects HASH algorithm, unique identifier corresponding in the document is pushed in alliance's chain is
Can not inverse operation, once cochain success if can not change.
The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.
In one particular embodiment of the present invention, the chain code means include:
Client logs in CA and obtains signing certificate, sends transaction request to endorsement node;
Node of endorsing carries out authority verification, and simulates Chaincode transaction, and return endorsement result of signing, wherein endorsement refers to
Whether endorsement node checks the request from client received according to the logic of itself, with decision in advance with the mistake of support
Journey;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint by client, wherein sequence is reached to a batch transaction of a period of time
Globally consistent sequence in one network;
By ordering joint to read-write collection sequence, and according to block arrangement block out, confirmation node is sent by block;
Confirmation node exports after verifying to block, transaction read-write collection and endorsement strategy.
Specifically, client (SDK), which logs in CA, obtains signing certificate (ECert);The endorsement section of client (SDK) Xiang Yiding
Point (Endorser) sends transaction request (Proposal);Endorsement node (Endorser) carries out authority verification, and simulates
Chaincode transaction, as a result Yes/No, and return endorsement result (Endorserment) of signing;Client (SDK) receives enough
More endorsements (Endorserment) checks endorsement quantity and whether legal;Client (SDK) sends the transaction by endorsement
To ordering joint (Orders);Ordering joint (Orders) sorts to read-write collection, and according to block arrangement block out
(Block), and block is sent to confirmation node (Committer);Confirm node (Committer) to block (Block), transaction
Read-write collection and endorsement strategy etc. are verified, and Blockchain is written and updates World State DB.
In one particular embodiment of the present invention, the identity of the real-name authentication client includes:
The document authentication information for inputting client, is uploaded to background server for the authentication information;
The authentication information is audited, the authentication information after audit is subjected to authentication verification by third-party server.
Specifically, by Business Name, legal representative, social credibility code, firm telephone, CompanyAddress and business license
The information such as information are committed to background server, administrative staff can information submitted to enterprises end carry out authenticity audit, wherein will
Enterprises end key message carries out the real-name authentication verifying of external tripartite's data, specific verification process: third party's big data is called to connect
Mouthful, when meeting third party's data-interface condition, then interface returned content being obtained in real time, authenticating and successfully then return to success, certification is lost
Lose, turn by manual examination and verification enterprise submit information, no matter administrative staff's auditing result whether all can stand in letter message by way of
Return the result to certification enterprises end;In addition, following closely the enterprise of inline certification by nail, i.e., requested by sending post to nail nail service
Device obtains voucher, further sends post request call acquisition enterprises end authorization message again using the voucher as parameter and then completes
Enterprise's application based on nail nail.
In one particular embodiment of the present invention, the documentary evidence issued in advance client is both needed to look into before inquiry
Asking displaying after authorizing includes:
Enterprises end receives the document, scans two dimensional code on the document and carries out revene lookup, and sends inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
Specifically, requiring user terminal before all documentary evidence inquiries issued carries out authorization query affirmative action, enterprise
End is scanned to two dimensional code on document and initiates inquiry request, user terminal need to scan document two dimensional code after receiving document
Into user's registration login interface, cell-phone number, identification card number in document are inputted, registers and logs in by mobile phone identifying code, is logged in
The page will will pop up " your information of XXX company application inquiry, if confirmation authorization " afterwards, click [authorization], the authorization that will acquire
Code success simultaneously receives i.e. completion authorization movement in a manner of short message, checks and searches for authorization history.
Veritification of the authentication authorization and accounting enterprises end to the document true and false, certification enterprises end receive the two dimensional code scanned after document on document
Revene lookup is carried out, authorization will be asked for user terminal transmission authorized application at this time since document content is related to part sensitive data
The process of code, authorization code is once obtain the document content that can correctly show with the content matching of cochain, and authorization code mistake is then
It can not show;The process that user terminal is authorized in the authorized application for receiving enterprises end verifying application transmission, user terminal authorization
Successful enterprise end will obtain the permission of inquiring document content, and otherwise enterprise will be unable to check document content.
Enterprises end authorization conditions are inquired, agree to that then enterprises end scans document two dimensional code for authorization, shows the document automatically and opens
The raw information of vertical cochain, forgives document block chain anti-fake code, two dimensional code, electronic-seal and content information.Such as verification from
Duty proves that content information then shows ID card No., name, telephone number, registration date, position, leave office date and original of leaving office
Because etc..In addition, the block chain anti-fake code by document can be linked in alliance's chain code, it is then true for existing, and there is no i.e.
It is false;
In one particular embodiment of the present invention, by the documentary evidence issued in advance be both needed to before inquiry client carry out inquiry award
Show that the document opens the raw information of cochain after power, wherein raw information include document block chain anti-fake code, two dimensional code,
Electronic-seal and content information.
As shown in figure 5, another aspect of the present invention, provides a kind of proof system based on block chain, comprising:
Authentication module, the identity for real-name authentication client, wherein client includes enterprises end and user terminal;
Configuration module is obtained for template to be respectively configured in different documentary evidences needed for client according to the client authenticated
Corresponding template is taken, and loads the configured document of the template;
Pushing module, for the template to be formulated data rule using granted network, marriage chain code means are by the document
In corresponding unique identifier be pushed in alliance's chain;
Authorization module is inquired, for the documentary evidence issued in advance to be both needed to show after client carries out inquiry authorization before inquiry.
In one particular embodiment of the present invention, the chain code means include:
First sending module logs in CA for client and obtains signing certificate, sends transaction request to endorsement node;
First inspection module, for endorsing, node carries out authority verification, and simulates Chaincode transaction, and return endorsement of signing
As a result;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint for client by the second sending module;
Third sending module for ordering joint to sort to read-write collection, and according to block arrangement block out, block is sent
To confirmation node;
Second correction verification module exports after node verifies block, transaction read-write collection and endorsement strategy for confirming.
In one particular embodiment of the present invention, authentication module includes:
The authentication information is uploaded to background server for inputting the document authentication information of client by input module;
The authentication information after audit is passed through third-party server for auditing the authentication information by authentication verification module
Carry out authentication verification.
In one particular embodiment of the present invention, the inquiry authorization module includes:
Scan module receives the document for enterprises end, scans two dimensional code on the document and carries out revene lookup, and sends
Inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
In one particular embodiment of the present invention, the documentary evidence issued in advance client is both needed to look into before inquiry
Show that the document opens the raw information of cochain after asking authorization, wherein raw information includes document block chain anti-fake code, two
Tie up code, electronic-seal and content information.
In conclusion workplace proof and evidence can not only be saved in real time by means of above-mentioned technical proposal of the invention, and
And avoid workplace data from playing tricks, while screening cost reduce and efficiently.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of method of proof based on block chain, which comprises the following steps:
The identity of real-name authentication client, wherein client includes enterprises end and user terminal;
Template is respectively configured in different documentary evidences needed for client, corresponding template is obtained according to the client authenticated, and
Load the configured document of the template;
The template is formulated into data rule using granted network, marriage chain code means are by unique mark corresponding in the document
Know symbol to be pushed in alliance's chain;
The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.
2. the method for proof according to claim 1 based on block chain, which is characterized in that the chain code means include:
Client logs in CA and obtains signing certificate, sends transaction request to endorsement node;
Node of endorsing carries out authority verification, and simulates Chaincode transaction, and return endorsement result of signing;Client receives foot
Enough endorsement nodes check endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint by client;
By ordering joint to read-write collection sequence, and according to block arrangement block out, confirmation node is sent by block;
Confirmation node exports after verifying to block, transaction read-write collection and endorsement strategy.
3. the method for proof according to claim 1 based on block chain, which is characterized in that the real-name authentication client
Identity includes:
The document authentication information for inputting client, is uploaded to background server for the authentication information;
The authentication information is audited, the authentication information after audit is subjected to authentication verification by third-party server.
4. the method for proof according to claim 1 based on block chain, which is characterized in that the documentary evidence issued in advance exists
Displaying after client carries out inquiry authorization is both needed to before inquiry includes:
Enterprises end receives the document, scans two dimensional code on the document and carries out revene lookup, and sends inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
5. the method for proof according to claim 1-4 based on block chain, which is characterized in that the card that will be issued in advance
Prescribed paper is both needed to show that the document opens the raw information of cochain after client carries out inquiry authorization before inquiry, wherein original
Information includes document block chain anti-fake code, two dimensional code, electronic-seal and content information.
6. a kind of proof system based on block chain characterized by comprising
Authentication module, the identity for real-name authentication client, wherein client includes enterprises end and user terminal;
Configuration module is obtained for template to be respectively configured in different documentary evidences needed for client according to the client authenticated
Corresponding template is taken, and loads the configured document of the template;
Pushing module, for the template to be formulated data rule using granted network, marriage chain code means are by the document
In corresponding unique identifier be pushed in alliance's chain;
Authorization module is inquired, for the documentary evidence issued in advance to be both needed to show after client carries out inquiry authorization before inquiry.
7. the proof system according to claim 6 based on block chain, which is characterized in that the chain code means include:
First sending module logs in CA for client and obtains signing certificate, sends transaction request to endorsement node;
First inspection module, for endorsing, node carries out authority verification, and simulates Chaincode transaction, and return endorsement of signing
As a result;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint for client by the second sending module;
Third sending module for ordering joint to sort to read-write collection, and according to block arrangement block out, block is sent
To confirmation node;
Second correction verification module exports after node verifies block, transaction read-write collection and endorsement strategy for confirming.
8. the proof system according to claim 6 based on block chain, which is characterized in that authentication module includes:
The authentication information is uploaded to background server for inputting the document authentication information of client by input module;
The authentication information after audit is passed through third-party server for auditing the authentication information by authentication verification module
Carry out authentication verification.
9. the proof system according to claim 6 based on block chain, which is characterized in that the inquiry authorization module packet
It includes:
Scan module receives the document for enterprises end, scans two dimensional code on the document and carries out revene lookup, and sends
Inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
10. according to the described in any item proof systems based on block chain of claim 6-9, which is characterized in that by what is issued in advance
Documentary evidence is both needed to show that the document opens the raw information of cochain, Central Plains after client carries out inquiry authorization before inquiry
Beginning information includes document block chain anti-fake code, two dimensional code, electronic-seal and content information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910468557.0A CN110222077A (en) | 2019-05-31 | 2019-05-31 | Method of proof and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910468557.0A CN110222077A (en) | 2019-05-31 | 2019-05-31 | Method of proof and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110222077A true CN110222077A (en) | 2019-09-10 |
Family
ID=67818920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910468557.0A Pending CN110222077A (en) | 2019-05-31 | 2019-05-31 | Method of proof and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110222077A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111738737A (en) * | 2020-07-31 | 2020-10-02 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for generating digital property right certificate |
CN112966956A (en) * | 2021-03-18 | 2021-06-15 | 四川跨客通科技有限公司 | Professional ability assessment system and method based on union link contract technology |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1019869B1 (en) * | 1997-04-14 | 2006-10-11 | Cummins-Allison Corporation | Image processing network |
CN109145275A (en) * | 2018-08-07 | 2019-01-04 | 广东工业大学 | A kind of block chain electronic contract management and intelligent generating system and method |
CN109242481A (en) * | 2018-06-28 | 2019-01-18 | 平安科技(深圳)有限公司 | Information approach, device and computer equipment are pledged based on block chain query |
CN109492984A (en) * | 2018-09-28 | 2019-03-19 | 火币(广州)区块链科技有限公司 | A kind of accessed enterprise educational background information approach and system based on block chain intelligence contract |
-
2019
- 2019-05-31 CN CN201910468557.0A patent/CN110222077A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1019869B1 (en) * | 1997-04-14 | 2006-10-11 | Cummins-Allison Corporation | Image processing network |
CN109242481A (en) * | 2018-06-28 | 2019-01-18 | 平安科技(深圳)有限公司 | Information approach, device and computer equipment are pledged based on block chain query |
CN109145275A (en) * | 2018-08-07 | 2019-01-04 | 广东工业大学 | A kind of block chain electronic contract management and intelligent generating system and method |
CN109492984A (en) * | 2018-09-28 | 2019-03-19 | 火币(广州)区块链科技有限公司 | A kind of accessed enterprise educational background information approach and system based on block chain intelligence contract |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111738737A (en) * | 2020-07-31 | 2020-10-02 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for generating digital property right certificate |
US11501317B2 (en) | 2020-07-31 | 2022-11-15 | Alipay (Hangzhou) Information Technology Co., Ltd. | Methods, apparatuses, and devices for generating digital document of title |
CN112966956A (en) * | 2021-03-18 | 2021-06-15 | 四川跨客通科技有限公司 | Professional ability assessment system and method based on union link contract technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6789193B1 (en) | Method and system for authenticating a network user | |
US9167428B2 (en) | Method and system for authenticating entities by means of terminals | |
CN102111275B (en) | User authentication and authorization method and system for implementing user authentication and authorization method | |
CN106067849B (en) | Digital signature method and device suitable for PDF document | |
US8549301B2 (en) | Method and computer system for ensuring authenticity of an electronic transaction | |
US20100161993A1 (en) | Notary document processing and storage system and methods | |
US20080104408A1 (en) | Notary document processing and storage system and methods | |
US20090037230A1 (en) | System for Electronic Application of Discounts to Insurance Policies | |
CN101218782A (en) | System and method for warranting electronic mail using a hybrid public key encryption scheme | |
US8700721B2 (en) | Method and system for electronic delivery of essential mail items | |
CN107317678B (en) | A kind of electronics confirmation request processing method Internet-based and system | |
CN106850693B (en) | Real-name authentication method and real-name authentication system | |
CN110098932A (en) | A kind of electronic document signature method based on safe electronic notarization technology | |
CN110753016B (en) | Real name authentication method based on block chain | |
WO2005076782A2 (en) | Use of public switched telephone network for capturing electronic signatures in on-line transactions | |
CN101090320A (en) | Indentify authorization method for dectronic signature | |
CN107666541B (en) | Method for realizing number safety and privacy protection | |
CN110222077A (en) | Method of proof and system based on block chain | |
CN104394166B (en) | The certificate false proof Verification System and method of facing moving terminal under a kind of cloud environment | |
KR20000049674A (en) | Method for providing and authenticating an electronic signature using a web site | |
CN113114629B (en) | Contract management method, device, equipment and storage medium based on block chain | |
KR20020029926A (en) | Method, article and apparatus for registering registrants, such as voter registrants | |
CN112597473A (en) | B2B service security authentication method and device based on enterprise official mailbox and server | |
KR100455048B1 (en) | Method and system for issuing documentary evidence using an internet | |
CN112632520B (en) | Method and system for registering real names of group telephone services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |